NYC

azure-postgres

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • Standard Command Usage (SAFE): The skill utilizes standard Azure CLI (az) and PostgreSQL (psql) commands to manage database resources and identities. No evidence of unauthorized privilege escalation or harmful command execution was found.
  • Authentication Best Practices (SAFE): The content explicitly focuses on migrating from password-based authentication to Entra ID (OAuth2/Managed Identity), which is a recommended security posture for Azure environments.
  • Credential Handling (SAFE): No hardcoded secrets, API keys, or passwords were detected. The scripts correctly use az account get-access-token to acquire short-lived tokens for authentication.
  • Data Privacy (SAFE): There are no indicators of data exfiltration or network requests to untrusted third-party domains. All operations are confined to the user's Azure environment and official Microsoft endpoints.
  • No Obfuscation or Injection (SAFE): Analysis of scripts and documentation shows no sign of prompt injection, multi-layer encoding, hidden characters, or deceptive metadata.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 11:08 PM